Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leaking Information Through Cache LRU States., and . CoRR, (2019)Information Flow Control in Machine Learning through Modular Model Architecture., , , , , , , , , and . CoRR, (2023)Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security., , , , , , and . CoRR, (2019)Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities., , and . IEEE Secur. Priv., 19 (3): 42-49 (2021)Characterization of MPC-based Private Inference for Transformer-based Models., , , , , , and . ISPASS, page 187-197. IEEE, (2022)MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention., , , , , , and . CoRR, (2022)Dynamic Physically Unclonable Functions., , , and . ACM Great Lakes Symposium on VLSI, page 311-314. ACM, (2019)Cache timing side-channel vulnerability checking with computation tree logic., , and . HASP@ISCA, page 2:1-2:8. ACM, (2018)An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels., , , , and . SRDS, page 46-57. IEEE, (2022)Decay-Based DRAM PUFs in Commodity Devices., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 462-475 (2019)